The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Love-bombing and Pig-butchering: How Romance Scams are Evolving

Love-bombing and Pig-butchering: How Romance Scams are Evolving

As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship, intimacy and connection. But alongside genuine relationships, this heightened activity also ...
Future-Proofing Your Data Infrastructure with Post-Quantum Cryptography

Future-Proofing Your Data Infrastructure with Post-Quantum Cryptography

Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using "harvest now, decrypt later" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data ...
Cyber is no Longer Abstract or Passive according to Former National Security Advisor of Japan

Cyber is no Longer Abstract or Passive according to Former National Security Advisor of Japan

Japan is no longer treating cyber threats as a background policy issue. As attacks soar across the region, Japan has taken the position toward active cyber defence, which in turn signals a more assertive national security posture. Mr. Kitamura, former National Security Advisor of Japan, is aware that the threat environment left little room for delay ...
Rising Cybersecurity Vulnerabilities In Increasingly Interconnected IT/OT Environments

Rising Cybersecurity Vulnerabilities In Increasingly Interconnected IT/OT Environments

From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data ...
Cyber Dashboards are Making Boards Feel Safer…and That’s the Real Risk

Cyber Dashboards are Making Boards Feel Safer…and That’s the Real Risk

Cyber dashboards could be driving complacency when it comes to cyber risk.
KnowBe4 Experts Calls for ‘Digital Mindfulness’ and Skepticism as AI Dominates Safer Internet Day 2026

KnowBe4 Experts Calls for ‘Digital Mindfulness’ and Skepticism as AI Dominates Safer Internet Day 2026

As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of AI’, highlights the urgent need for a new set of digital skills in the world of ...
Safer Internet Day 2026

Safer Internet Day 2026

Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper to run, and harder to spot. We’ve seen the impact in Australia. In 2024–25, the ...
‘The Emotional Hit was Real’, reveals former CISO at Medibank during the breach

‘The Emotional Hit was Real’, reveals former CISO at Medibank during the breach

Cyber incidents rarely begin with chaos. No sirens. No flashing lights. Just a quiet alert that something isn’t right. That’s how it started for Alex Loizou, former Chief Information Security Officer at Medibank, on an October evening in 2022. A routine detection. An anomaly that, at first glance, looked like background noise. It wasn’t. Within ...
No results found.

In The News

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management with Expanding Suite of AI Agents

KnowBe4 Accelerates the Future of Human Risk Management with Expanding Suite of AI Agents

AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage 
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR

Elastic Eliminates Per-Endpoint Pricing for XDR

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This